HP StorageWorks Storage Mirroring Recover User's Guide (T5437-96008, November 2009)

211 of 739
NIC, this increases the flexibility of configuring Storage Mirroring Recover activity. For
example, you can separate regular network traffic and Storage Mirroring Recover traffic
on a machine. The default ports will be used.
File Shares
By default, all non-administrative file shares are selected. You can add other data that
you want to protect by selecting the checkbox next to it in the tree view.
Note:
On a domain controller, you cannot protect the NETLOGON and SYSVOL
shares and they will not be visible in the File Shares tree.
You can also select non-application specific data under the Volumes folder.
Note:
If Override Generated Rules is selected on the Advanced tab, this control will
be disabled.
To refresh the tree view to show new source directories or files that may have been
added or removed, select the logical node, then click the Refresh button. If a node in the
volumes branch is selected, then the items under that node will be refreshed.
Mirror type
The following options specify what files you want sent from the source to the target
during a mirror.
Full—Copies all of the directories and files in the replication set to the target
machine. If a mirror has already been completed, another full mirror will overwrite
the data on the target.
Checksum—(Default) This option performs a checksum comparison calculation. A
checksum calculation is a formula applied to blocks of data to determine if the
binary make-up of the block is identical. If the checksums on the source and target
machine are the same, the block is skipped. If the checksums on the source and
target machine are not the same, the block on the source is sent to the target. With
this option, the entire file is not overwritten; only the block that is received from the
source is overwritten.
Note: The Mirror type setting also applies to the restoration connection.
Enable compression
This setting enables compression of data that is transmitted from the source to the target.
Significant improvements in bandwidth utilization have been seen in Wide Area Network
(WAN) configurations or in any case where network bandwidth is a constraint.